Privacy Preserving in Two Authenticated Servers by Key Exchange
Total Page:16
File Type:pdf, Size:1020Kb
ISSN No: 2348-4845 International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal Privacy Preserving in Two Authenticated Servers by Key Exchange Mr.P.Anji Babu, M.Tech G.Tabitha J.bhaskar J.Soumya Asst prof, B.Tech Student, B.Tech Student, B.Tech Student, Department of CSE, Department of CSE, Department of CSE, Department of CSE, TKR College of Engineering TKR College of Engineering TKR College of Engineering TKR College of Engineering & Technology. & Technology. & Technology. & Technology. Abstract: Introduction: Key exchange (also known as “key establishment”) is If sender and receiver wish to exchange encrypted mes- any method in cryptography by which cryptographic sages, each must be equipped to encrypt messages to keys are exchanged between users, allowing use of a be sent and decrypt messages received. The nature of cryptographic algorithm.Diffie–Hellman key exchange the equipping they require depends on the encryption (D–H) is a specific method of securely exchanging technique they might use. If they use a code, both will cryptographic keys over a public channel and was one require a copy of the same codebook. If they use a ci- of the first public-key protocols as originally conceptu- pher, they will need appropriate keys. If the cipher is alized by Ralph Merkle. D–H is one of the earliest prac- a symmetric key cipher, both will need a copy of the tical examples of public key exchange implemented same key. If an asymmetric key cipher with the public/ within the field of cryptography. The Diffie–Hellman private key property, both will need the other’s public key exchange method allows two parties that have key. no prior knowledge of each other to jointly establish a shared secret key over an insecure channel. The key exchange problem: This key can then be used to encrypt subsequent com- The key exchange problem is how to exchange what- munications using a symmetric key cipher.- Due to ad- ever keys or other information are needed so that no vances in technology and communication, it requires one else can obtain a copy. Historically, this required more effort to ensure security. It is essential that every- trusted couriers, diplomatic bags, or some other se- organization has the right level of security. Authentica- cure channel. With the advent of public key / private tion in security had emerged to be an essential factor key cipher algorithms, the encrypting key (aka public in the keyestablishment over internet. The DIKE (Deni- key) could be made public, since (at least for high qual- able Internet Key Exchange) protocols add novelty and ity algorithms) no one without the decrypting key (aka, new value to the IKEstandard. In recent communication the private key) could decrypt the message. systems, as there is more and more use of internet, the security services have becomeessential. Key-exchange Identification: in Diffie–Hellman key-exchange (DHKE) is among the core cryptographic mechanisms to ensurenetwork se- In principle, the only remaining problem was to be sure curity. (or at least confident) that a public key actually be- longed to its supposed owner. Because it is possible to Keywords: ‘spoof’ another’s identity in any of several ways, this is not a trivial or easily solved problem, particularly when Key exchange, Authentication, Cryptography, Dike, the two users involved have never met and know noth- IKE ing about each other. Volume No: 2 (2015), Issue No: 4 (April) April 2015 www.ijmetmr.com Page 210 ISSN No: 2348-4845 International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal Diffie–Hellman key exchange: authorities. VeriSign is the most prominent commercial firm.This does nothing to solve the problem though, as In 1976, Whitfield Diffie and Martin Hellman published the trustworthiness of the CA itself is still not guaran- a cryptographic protocol called the Diffie–Hellman key teed from an individual’s standpoint. It is a form of ar- exchange (D–H) based on concepts developed by Hell- gument from authority fallacy. For actual trustworthi- man’s PhD student Ralph Merkle. The protocol enables ness, personal verification that the certificate belongs users to securely exchange secret keys even if an op- to the CA and establishment of trust in the CA are re- ponent is monitoring that communication channel. The quired. This is usually not possible. D–H key exchange protocol, however, does not by it- self address authentication (i.e. the problem of being For those new to such things, these arrangements are sure of the actual identity of the person or ‘entity’ at best thought of as electronic notary endorsements the other end of the communication channel). Authen- that “this public key belongs to this user”. As with no- tication is crucial when an opponent can both monitor tary endorsements, there can be mistakes or misunder- and alter messages within the communication channel standings in such vouchings. Additionally, the notary (aka man-in-the-middle or MITM attacks) and was ad- itself can be untrusted. There have been several high dressed in the fourth section of the 1976 paper. profile public failures by assorted certificate authori- ties. Web of trust: At the other end of the conceptual range is the web of trust system, which avoids central Certificate Authori- ties entirely. Each user is responsible for getting any certificate from another before using that certificate to communicate with, vet digital signatures from, ... the user claimed to be associated with the particular public key in a certificate. PGP (and GPG, an implementation of the OpenPGP Internet Standard) employ just such a web of trust mechanism. Together they are the most widely used high quality crypto system in the world. [citation needed] Password-authenticated key agreement: Password-authenticated key agreement algorithms Public key infrastructure: can perform a cryptographic key exchange utilizing knowledge of a user’s password. Public key infrastructures (PKIs) have been proposed as a way around this problem of identity authentica- Quantum key exchange: tion. In their most usual implementation, each user ap- plies to a ‘certificate authority’ for a digital certificate The BB84 key exchange protocol—like any quantum which serves for other users as a non-tamperable au- key exchange protocol—exploits certain properties thentication of identity, at the risk of compromising quantum physics to ensure its security. Since quantum every user in case the CA itself is compromised. Several mechanics ensures physical traces as a result of mere countries and other jurisdictions have passed legisla- observation, it provides protection against man-in- tion or issued regulations encouraging PKIs by giving the-middle attacks that cannot, as a matter of physical (more or less) legal effect to these digital certificates. principle, be circumvented. Several commercial firms, and a few government de- partments, have established such certificate Volume No: 2 (2015), Issue No: 4 (April) April 2015 www.ijmetmr.com Page 211 ISSN No: 2348-4845 International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal The Internet Key Exchange (IKE) is an IPsec (In- 2. Secure key exchange security(SK-security) ternet Protocol Security) standard protocol used to ensure security for virtual private network (VPN) nego- 3. Concurrent Non- Malleable statistical Zero-Knowl- tiation and remote host or network access. Specified in edge (CNMSZK) for DHKE IETF Request for Comments (RFC) 2409, IKE defines an automatic means of negotiation and authentication for 4. Concurrent knowledge of Exponent Assumption. IPsec security associations (SA). Security associations These various methods are get compared with each are security policies defined for communication be- other. tween two or more entities; the relationship between the entities is represented by a key. The IKE protocol a) SK-security vs. CNMSZK for DHKE: ensures security for SA communication without the preconfiguration that would otherwise be required. According to Sk-security if the session is uncorrupted then the session key is unknown to anyone expect this A hybrid protocol, IKE implements two earlier security peer and if theunexposed peer completes a matching protocols, Oakley and SKEME, within an ISAKMP (In- session then the two parties have the same shared key. ternet Security Association and Key Management Pro- Now according to CNMSZK if the possibly malicious tocol) TCP/IP-based framework. ISAKMP specifies the peer completes a matching session then not only the framework for key exchange and authentication; the two parties havethe same shared key but also the peer Oakley protocol specifies a sequence of key exchanges does know both the DH-exponent and the secret key and describes their services (such as identity protection corresponding to the DH-componentand public key and authentication); and SKEME specifies the actual send alleged by it in the test-session. method of key exchange. Although IKE is not required for IPsec configuration, it offers a number of benefits, b) CNMSZK for DHKE vs. traditional CNMSZK including: automatic negotiation and authentication; based approaches: anti-replay services (see anti-replay protocol); certifica- tion authority (CA) support; and the ability to change CNMSZK formulation for DHKE is based on the tradi- encryption keys during an IPsec session. tional CNMSZK formulation but some essential differ- ences. On onehand traditional CNMSZK formulation LITERATURE REVIEW: considers a pair of players of fixed role, specifically one prover and one verifier. Onother hand , privacy preserv- Various authors describe various features in their tech- ing CNMSZK proposes additional privacy requirements niques which they are used for the Internet key ex- for the session messages of DHKE beingexchanged change ,all havetheir smart opinions and illustration for concurrently over internet. the key exchange mechanism. Suyeon Park and Hee-Joo Park(IJSIA Vol.8, No.4 (2014), Andrew Chi-Chao Yao and yunlei Zao(IEEE VOL.